Research Article

Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec

Figure 7

Results of switching the policies of combined algorithms: (a) controlling program for switching; (b) policy switching records in the log file.
(a)
(b)